We ’ve have it off for months that Hillary Clinton ’s use of private electronic mail for official businesswas a security measures nightmare . Now we ’re starting to find out a niggling act about how that incubus unfolded . hacker from at least three countriestargeted her serversafter she left office in 2013 .

This should n’t be a surprisal , although it is pretty disconcerting . A congressional document find by the Associated Press says that Clinton ’s servers were the subject of plan of attack from China , South Korea , and Germany . This detail from the AP reportis passably speculative :

While the attempt were apparently blocked by a “ threat monitoring ” mathematical product that Clinton ’s employee relate to her internet in October 2013 , there was a period of more than three month from June to October 2013 when that protection had not been set up , according to a missive from Republican senator Ron Johnson , chairman of the homeland security and governance amour citizens committee . That means her server was possibly vulnerable to cyber - attacks during that meter .

Starship Test 9

The AP added :

It was not immediately unclouded whether the attempted invasion into Clinton ’s waiter were serious espionage threats or the sort of nuisance attacks that hit computing machine servers the world over .

This risk was immediately clear-cut from the bit we learned that Hillary Clinton , a frontrunner in the 2016 presidential election , made extremely raw information less good by using a private email waiter . Clinton say that she did so to avoid juggling multiple devices — although now we knowthat excuse was bullshit . The congressional investigating is now revealing all variety of things about how shewas email classified information over private linesand getting whoop around the same time . But of course of study she was .

Lilo And Stitch 2025

It remain undecipherable how this slow - burning scandal will unfold . Hopefully it ’s just more unenviable newsworthiness for this pol who wants to be chairperson . In the worst - grammatical case scenario , some cyber-terrorist indeed got in , and we just do n’t know it yet . But we do know that they were trying .

[ AP ]

connect with the author at[email   protected].Public PGP keyPGP fingermark : 91CF B387 7B38 148C DDD6 38D2 6CBC 1E46 1DBF 22A8

CMF by Nothing Phone 2 Pro has an Essential Key that’s an AI button

HackersHackingHillary ClintonPoliticsSecurity

Daily Newsletter

Get the beneficial tech , science , and civilization news in your inbox daily .

News from the hereafter , delivered to your present tense .

You May Also Like

Photo: Jae C. Hong

Doctor Who Omega

Roborock Saros Z70 Review

Justjune

Blue book

Starship Test 9

Lilo And Stitch 2025

CMF by Nothing Phone 2 Pro has an Essential Key that’s an AI button

Photo: Jae C. Hong

Roborock Saros Z70 Review

Polaroid Flip 09

Feno smart electric toothbrush

Govee Game Pixel Light 06